• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Invoker v3.5.1 - Penetration testing utility

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,456
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
invoker.jpg


Penetration testing utility.

The goal is to use this tool when access to some Windows OS features through GUI is restricted.

Capabilities:

    invoke the Command Prompt and PowerShell,
    use Windows Management Instrumentation (WMI),
    connect to a remote host,
    run a new process,
    terminate a running process,
    dump a process memory,
    inject a bytecode into a running process,
    inject a DLL into a running process,
    list DLLs of a running process,
    install a hook procedure,
    enable access token privileges,
    duplicate the access token of a running process,
    download a file,
    add a registry key,
    schedule a task,
    list unquoted service paths and restart a running service,
    replace System32 files.

Changelog v3.5.1

    Added process hollowing. File read and write update.

     
    Added bytecode and DLL injection through an asynchronous procedure call (APC).


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top